Dell POWEREDGE M1000E User Manual
Page 467
Fabric OS Command Reference
435
53-1001764-02
ipSecConfig
2
type
Specifies the policy to be created. Supported policies include:
policy ips
Creates or modifies an IPSec policy. This policy determines the security
services afforded to a packet and the treatment of a packet in the network.
An IPSec policy allows classifying IP packets into different traffic flows and
specifies the actions or transformations performed on IP packets on each of
the traffic flows. The main components of an IPSec policy are: IP packet
filter/selector (IP address, protocol, and port information) and transform set.
subtype
A subtype is required when configuring an IPSec policy. The subtype
specifies the components to be configured. The following are required
subtypes for the IPSec policy:
selector
Creates a selector that is applied to the IP data traffic. A selector consists
of a set of parameters that identify the IP traffic that needs IPSec
protection. To configure the selector, the following parameters must be
specified:
-tag name
Specifies a name for the selector. This is a user-generated name. The
name must be between 1 and 32 characters in length, and may include
alphanumeric characters, dashes (-), and underscores (_).
-direction in|out
Specifies traffic flow direction as inbound or outbound.
-local IP_address[/prefixlength] Specifies the source IPv4 or IPv6 address.
-remote IP_address[/prefixlength]
Specifies the peer IPv4 or IPv6 address.
-transform name
Specifies the transform to be included in the selector. You must create
the transform before you can use in the selector. Use ipsecConfig
--
show policy ips transform to display existing transforms.
-protocol protocol_name
Specifies the upper layer protocols to be selected for IPSec protection.
Valid protocols include tcp, udp, icmp or any. When any is specified all
existing protocols are selected for protection. This operand is optional.
transform
Creates the IPSec transform set. The transform set is a combination of
IPSec protocols and cryptographic algorithms that are applied on the
packet after it is matched to a selector. The transform set specifies the
IPSec protocol, the IPSec mode, and the action to be performed on the IP
packet. It also specifies the key management policy that is needed for
the IPSec connection and the encryption and authentication algorithms
to be used in security associations when IKE is used as key management
protocol. The following operands are required:
-tag name
Specifies a name for the transform. This is a user-generated name. The
name must be between 1 and 32 characters in length, and may include
alphanumeric characters, dashes (-), and underscores (_).